{"id":65310,"date":"2017-11-01T07:05:34","date_gmt":"2017-11-01T07:05:34","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2017\/11\/roca-encryption-vulnerability\/"},"modified":"2025-11-14T15:23:47","modified_gmt":"2025-11-14T15:23:47","slug":"roca-encryption-vulnerability","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/es\/blog\/2017\/11\/roca-encryption-vulnerability\/","title":{"rendered":"ROCA: la vulnerabilidad del cifrado y c\u00f3mo abordarla"},"content":{"rendered":"<p>Los investigadores descubrieron recientemente una vulnerabilidad peligrosa, llamada ROCA, en tarjetas inteligentes criptogr\u00e1ficas, tokens de seguridad y otros chips de hardware seguros fabricados por Infineon Technologies.<\/p>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2017\/11\/roca-encryption-vulnerability\/\">Leer m\u00e1s en ingl\u00e9s<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Los investigadores descubrieron recientemente una vulnerabilidad peligrosa, llamada ROCA, en tarjetas inteligentes criptogr\u00e1ficas, tokens de seguridad y otros chips de hardware seguros fabricados por Infineon Technologies. Leer m\u00e1s en ingl\u00e9s<\/p>\n","protected":false},"author":1012,"featured_media":65311,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[4319,186,179,4910,4777,184],"tags":[],"region_news_regions":[6030],"content_category":[6102],"ppma_author":[4109],"class_list":["post-65310","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cifrado","category-confianza","category-seguridad","category-fortalecimiento-de-internet","category-seguridad-es","category-tecnologia","region_news_regions-global","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Encryption-words-1.jpg",976,505,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Encryption-words-1-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Encryption-words-1-300x155.jpg",300,155,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Encryption-words-1-768x397.jpg",768,397,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Encryption-words-1.jpg",976,505,false],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Encryption-words-1.jpg",976,505,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Encryption-words-1.jpg",976,505,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Encryption-words-1-250x129.jpg",250,129,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Encryption-words-1-600x505.jpg",600,505,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Encryption-words-1.jpg",300,155,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Encryption-words-1.jpg",400,207,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/Encryption-words-1.jpg",600,310,false]},"uagb_author_info":{"display_name":"Robin Wilton","author_link":"https:\/\/www.internetsociety.org\/es\/author\/wilton\/"},"uagb_comment_info":0,"uagb_excerpt":"Los investigadores descubrieron recientemente una vulnerabilidad peligrosa, llamada ROCA, en tarjetas inteligentes criptogr\u00e1ficas, tokens de seguridad y otros chips de hardware seguros fabricados por Infineon Technologies. Leer m\u00e1s en ingl\u00e9s","authors":[{"term_id":4109,"user_id":1012,"is_guest":0,"slug":"wilton","display_name":"Robin Wilton","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Robin-Wilton.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/06\/Robin-Wilton.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/65310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/1012"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=65310"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/65310\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/65311"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=65310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=65310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=65310"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=65310"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=65310"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=65310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}